Below please find foundational steps to take if you’d like to stay safer.
Two Factor Authentication
Even before you embrace encryption, one of the most important things is to make sure to use Two-Factor Authentication (2FA, or also 2-Step Verification) on every online account that supports it, but especially your email account. When set up, you will need more than just your password to log into your Google account (and so will hackers).
Depending on your settings, this second form of verification could be a temporary security code from a 2FA app (such as Google Authenticator or Authy ), or a verification code that you received as a text message. See Google 2-Step Verification .
We cannot overstate the importance of 2FA, it is the first thing you should do to protect all your online accounts. Don’t just stop at your email account - most online services these days offer 2FA setup. Check their settings or ask their support.
You should set all your devices to require your pass phrase before you open encrypted email. This way, when you lose your device or it gets stolen, whoever has your device will not have access to your encrypted email.
You should check for any updates on your Operating System as well as your browser. If it’s prompting you to install updates, do it without delay to keep your system safe.
Full Disk Encryption
This is one of the best defenses to get you out of trouble when your device is lost or stolen. When your device storage is encrypted, it is very difficult to extract information from the it without your device pass phrase.
|Windows 10||Turn on device encryption|
|Apple MacOS||Use FileVault to encrypt your Mac|
|Linux, Ubuntu||Install system with
|Android||Encrypt Your Android Data and choose a stronger device password|
|iOS||How to encrypt your iPhone|
More technical document: FlowCrypt Security.